Engineering:Over-the-air update
An over-the-air update (or OTA update), also known as over-the-air programming (or OTA programming),[1] is an update to an embedded system that is delivered through a wireless network, such as Wi-Fi or a cellular network.[2][3][4]
These embedded systems include mobile phones, tablets, set-top boxes, cars and telecommunications equipment.
OTA updates for cars and internet of things devices can also be called firmware over-the-air (FOTA).[5][6]
Various components may be updated OTA, including the device's operating system, applications, configuration settings, or parameters like encryption keys.
Terminology
The term over-the-air update applies specifically to embedded systems,[4] rather than non-embedded systems like computers. Before OTA updates, embedded devices could only be flashed through direct physical access (with a JTAG) or wired connections (usually through USB or a serial port).
Purpose
Over-the-air delivery may allow updates to be distributed at larger scales, reduce the cost of delivering updates,[7] or increase the rate of adoption of these updates.
Implementation
The distributor of these updates can decide whether users are allowed to decline these updates, and may choose to disable certain features on end-user devices until an update is applied. Users may be unable to revert an update after it is installed.
OTA updates are designed to be as small as possible in order to minimize energy consumption, network usage, and storage space. This is achieved by only transferring the differences between the old firmware and the new firmware, rather than transmitting the entire firmware. A delta of the old and new firmware is produced through a process called diffing; then, the delta file is distributed to the end-device, which uses the delta file to update itself.[8]
Industries
Smartphones
On smartphones, tablets, and other devices, an over-the-air update is a firmware or operating system update that is downloaded by the device over the internet. Previously, users had to connect these devices to a computer over USB to perform an update. These updates may add features, patch security vulnerabilities, or fix software bugs. The two main mobile operating systems are iOS and Android.
iOS gained support for over-the-air updates in iOS 5.[9] iOS updates are distributed exclusively by Apple, resulting in wide availability and relatively high adoption rates. Major iOS releases are usually installed on 60%-70% of iPhones within a few months of the update's release.[10][11][12]
Android OTA updates are not distributed directly by Google, but by OEMs (like Samsung) and wireless carriers.[13] This has led to inconsistent availability of updates, and to Android fragmentation.[11][12] In the past, fragmentation increased the complexity of developing third-party apps for Android (due to inconsistent availability of the latest software frameworks on users' phones),[14] and led to security concerns due to delays in the distribution of security updates.[15] Google has reduced Android fragmentation through the 2017 Project Treble, which allows OEMs to release OS updates without needing to re-test hardware drivers for each version, [13][16] and the 2019 Project Mainline, which allows Google to update Android components[16] and deliver security patches[17] through its Play Store, without requiring a full OS update.[16] Project Mainline significantly lowers the role of middlemen in delivering OTA updates.[18][17] Since Android 8.0, Android OTA updates follow an A/B partition scheme, in which an update is installed to a second ("B") partition in the background, and the phone switches to that partition the next time it is rebooted; this reduces the time taken to install updates.[19]
Automotive
Cars can support OTA updates to their in-car entertainment system, navigation map, telematic control unit, or their electronic control units (the onboard computers responsible for most of the car's operation).[20] In cars, the telematic control unit is in charge of downloading and installing updates,[4] and OTA updates are downloaded through cellular networks, like smartphones. Cars cannot be driven while an OTA update is being installed. Before an update, the car checks that the update is genuine, and after the update completes, it verifies the integrity of all affected systems.[20]
OTA updates provide several benefits. In the past, Volkswagen had to recall 11 million vehicles to fix an issue with its cars' emissions control software, and other manufacturers have instituted recalls due to software bugs affecting the brakes, or the airbags, requiring all affected customers to travel to dealership to receive updates. OTA updates would have removed the need to go through dealerships, leading to lower warranty costs for manufacturers and lower downtime for customers. OTA updates also allow manufacturers to deploy potential new features and bug fixes more quickly, making their cars more competitive in the market, and resulting in an increased pace of product improvements for consumers. For example, OTA updates can deliver improvements to a car's driver assistance systems and improve the car's safety.[5](pp138-139)[20]
However, OTA updates can also present a new attack vector for hackers, since security vulnerabilities in the update process could be used by hackers to remotely take control of cars. Hackers have discovered such vulnerabilities in the past, and many car manufacturers have responded by instituting vulnerability disclosure programs (a.k.a. bug bounty programs).[20][21] Attack vectors specific to OTA updates include "spoofing, tampering, repudiation [attacks], information leakage, denial-of-service," replay attacks, and privilege escalation attacks. Example scenarios include a hacker successfully interrupting an ongoing update (deemed a "flashing fail"), which may corrupt the car's computer systems and make the car malfunction later on; another scenario is "arbitrary flashings", in which hackers trick the car into installing a malicious OTA update.[5](pp141-142)
Internet of things (IoT)
More recently, with the new concepts of Wireless Sensor Networks and the Internet of Things (IoT), where the networks consist of hundreds or thousands of nodes, OTA is taken to a new direction: for the first time OTA is applied using unlicensed frequency bands (868 MHz, 900 MHz, 2400 MHz) and with low consumption and low data rate transmission using protocols such as 802.15.4 and Zigbee.[22]
Sensor nodes are often located in places that are either remote or difficult to access. As an example, Libelium has implemented an OTA programming system for Zigbee WSN devices. This system enables firmware upgrades without the need of physical access, saving time and money if the nodes must be re-programmed.[23]
Internet routers
OTA is similar to firmware distribution methods used by other mass-produced consumer electronics, such as cable modems, which use TFTP as a way to remotely receive new programming, thus reducing the amount of time spent by both the owner and the user of the device on maintenance.
Over-the-air provisioning (OTAP) is also available in wireless environments (though it is disabled by default for security reasons). It allows an access point (AP) to discover the IP address of its controller. When enabled, the controller tells the other APs to include additional information in the Radio Resource Management Packets (RRM) that would assist a new access point in learning of the controller. It is sent in plain text however, which would make it vulnerable to sniffing. That is why it is disabled by default.
Cellular networks
Over-the-air provisioning (OTAP) is a form of OTA update by which cellular network operators can remotely provision a mobile phone (termed a client or mobile station in industry parlance) and update the cellular network settings stored on its SIM card. This can occur at any time while a phone is turned on. The term over-the-air parameter administration (OTAPA) is synonymous.[24][25] OTA provisioning allows mobile phones to remain properly configured when cellular network operators make changes to their networks. It also configures phones with the settings required to access certain features, like WAP (an early incarnation of the mobile web), MMS messaging, and cellular data (which requires the configuration of an Access Point Name).
The similar term over-the-air service provisioning (OTASP) specifically refers to the wireless initial provisioning ("activation") of a phone. During activation, a mobile phone is provisioned with parameters like its phone number, mobile identification number, and system ID, granting it initial access to the cellular network. OTASP is sometimes called over-the-air activation or over-the-air bootstrapping. The alternative to OTA bootstrapping is SIM bootstrapping, where the phone reads the network settings stored on a SIM card. SIM bootstrapping has limitations: settings stored on a SIM card may become stale between the time the SIM is manufactured and the time it is used; also, some phones (and other cellular client equipment) do not use SIM cards.[25][26]
Various standards bodies have issued OTA provisioning standards. In 2001, the WAP Forum published the WAP Client Provisioning standard. After the Open Mobile Alliance subsumed the WAP Forum, this standard became known as OMA Client Provisioning (OMA CP). In OMA CP, phones are provisioned by "invisible" SMS messages sent by the cellular network, which contain the requisite settings. OMA CP was followed by a newer standard, OMA Device Management (OMA DM), which use a different form of SMS-based provisioning (called "OMA Push"). OMA DM sessions are always client-initiated. The "invisible" SMS does not contain configuration settings; instead, it tells the phone (the "DM Client") to connect to a DM Server (operated by the cellular network provider); once connected, the DM Server sends configuration commands to the client.[26]
OTA standards
There are a number of standards that describe OTA functions. One of the first was the GSM 03.48 series. The Zigbee suite of standards includes the Zigbee Over-the-Air Upgrading Cluster which is part of the Zigbee Smart Energy Profile and provides an interoperable (vendor-independent) way of updating device firmware.
See also
References
- ↑ White, Elecia (November 2011) (in en). Making Embedded Systems: Design Patterns for Great Software. "O'Reilly Media, Inc.". pp. 197. ISBN 978-1-4493-0214-6. https://books.google.com/books?id=bI8w17SyNdYC.
- ↑ "Definition of OTA" (in en). https://www.pcmag.com/encyclopedia/term/ota.
- ↑ "Definition of Over The Air" (in en). https://www.gartner.com/en/information-technology/glossary/ota-over-the-air.
- ↑ 4.0 4.1 4.2 Kathiresh, M.; Neelaveni, R. (2021-04-24) (in en). Automotive Embedded Systems: Key Technologies, Innovations, and Applications. Springer Nature. pp. 94–95. ISBN 978-3-030-59897-6. https://books.google.com/books?id=PyMrEAAAQBAJ.
- ↑ 5.0 5.1 5.2 Maglaras, Leandros; Kantzavelou, Ioanna (2021-10-14) (in en). Cybersecurity Issues in Emerging Technologies. CRC Press (Taylor & Francis). doi:10.1201/9781003109952. ISBN 9780367626174. https://books.google.com/books?id=QiRAEAAAQBAJ.
- ↑ Rayes, Ammar; Salam, Samer (2019) (in en). Internet of Things From Hype to Reality: The Road to Digitization. Cham: Springer International Publishing. doi:10.1007/978-3-319-99516-8. ISBN 978-3-319-99515-1. http://link.springer.com/10.1007/978-3-319-99516-8.
- ↑ "What are OTA Updates?". https://connectedmobility.co/what-are-ota-updates/.
- ↑ Kachman, Ondrej; Balaz, Marcel (2016). "Effective Over-the-Air Reprogramming for Low-Power Devices in Cyber-Physical Systems". in Camarinha-Matos, Luis M. (in en). Technological Innovation for Cyber-Physical Systems. Springer Cham. doi:10.1007/978-3-319-31165-4. ISBN 978-3-319-31164-7. https://link.springer.com/book/10.1007/978-3-319-31165-4.
- ↑ Savov, Vlad (June 6, 2011). "Apple's iOS 5: all the details" (in en-US). https://www.engadget.com/2011-06-06-apples-ios-5-all-the-details.html.
- ↑ Rossignol, Joe. "Apple Reveals How Many iPhones and iPads Are Running iOS 16 and iPadOS 16" (in en). https://www.macrumors.com/2023/02/16/ios-16-adoption-stats-from-apple/.
- ↑ 11.0 11.1 Mearian, Lucas (21 January 2022). "Apple: iOS 15 now installed on more than 60% of all iPhones" (in en). https://www.computerworld.com/article/3647877/apple-ios-15-now-installed-on-more-than-60-of-all-iphones.html.
- ↑ 12.0 12.1 Evans, Jonny (31 May 2013). "Fragmented Android drives big dev to Apple" (in en). https://www.computerworld.com/article/2475581/fragmented-android-drives-big-dev-to-apple.html.
- ↑ 13.0 13.1 Amadeo, Ron (2017-05-12). "Google's "Project Treble" solves one of Android's many update roadblocks" (in en-us). https://arstechnica.com/gadgets/2017/05/google-hopes-to-fix-android-updates-no-really-with-project-treble/.
- ↑ "What is Android fragmentation, and can Google fix it?" (in en). 5 September 2016. https://www.androidauthority.com/android-fragmentation-google-fix-it-713210/.
- ↑ Nguyen-Vu, Long; Ahn, Jinung; Jung, Souhwan (1 November 2019). "Android Fragmentation in Malware Detection". Computers & Security 87: 101573. doi:10.1016/j.cose.2019.101573.
- ↑ 16.0 16.1 16.2 Amadeo, Ron (2019-05-22). "Android at I/O 2019: The Project Mainline update system and other highlights" (in en-us). https://arstechnica.com/gadgets/2019/05/digging-into-android-q-beta-3-better-gesture-nav-a-new-update-system-and-more/.
- ↑ 17.0 17.1 Siddiqui, Aamir (2020-10-10). "Everything you need to know about Android's Project Mainline" (in en). https://www.xda-developers.com/android-project-mainline-modules-explanation/.
- ↑ Amadeo, Ron (2020-09-23). "Android 11—The Ars Technica Review" (in en-us). https://arstechnica.com/gadgets/2020/09/android-11-the-ars-technica-review/.
- ↑ Amadeo, Ron (2017-08-07). "Android 8.0's "streaming OS updates" will work even if your phone is full" (in en-us). https://arstechnica.com/gadgets/2017/08/android-8-0s-streaming-os-updates-will-work-even-if-your-phone-is-full/.
- ↑ 20.0 20.1 20.2 20.3 Halder, Subir; Ghosal, Amrita; Conti, Mauro (2020-09-04). "Secure over-the-air software updates in connected vehicles: A survey" (in en). Computer Networks 178: 107343. doi:10.1016/j.comnet.2020.107343. ISSN 1389-1286. https://www.sciencedirect.com/science/article/pii/S1389128619314963.
- ↑ Gitlin, Jonathan M. (11 January 2023). "Hackers discover that vulnerabilities are rife in the auto industry" (in en-us). https://arstechnica.com/cars/2023/01/hackers-discover-that-vulnerabilities-are-rife-in-the-auto-industry/.
- ↑ Gascón, David; Alberto Bielsa (9 May 2011). "Over the Air programming with 802.15.4 and ZigBee - OTA". Libelium. http://www.Libelium.com/over_the_air_programming_OTA_802.15.4_ZigBee/.
- ↑ "Libelium.com 50 Sensor applications for a smarter world. Get inspired!". Libelium. 2 May 2012. http://www.Libelium.com/50_sensor_applications.
- ↑ Raghunandan, Krishnamurthy (April 1, 2022) (in en). Introduction to Wireless Communications and Networks: A Practical Perspective. Textbooks in Telecommunication Engineering (1st ed.). Springer Cham. doi:10.1007/978-3-030-92188-0. ISBN 978-3-030-92187-3. https://link.springer.com/book/10.1007/978-3-030-92188-0.
- ↑ 25.0 25.1 Snyder, Randall A.; Gallagher, Michael D. (2001-04-05) (in en). Wireless Telecommunications Networking with ANSI-41. McGraw Hill Professional. pp. 374–376. ISBN 978-0-07-138358-5. https://books.google.com/books?id=CBENX_edL0MC.
- ↑ 26.0 26.1 Brenner, Michael; Unmehopa, Musa (2008-02-28) (in en). The Open Mobile Alliance: Delivering Service Enablers for Next-Generation Applications. John Wiley & Sons. pp. 273–279. ISBN 978-0-470-51918-9.
Original source: https://en.wikipedia.org/wiki/Over-the-air update.
Read more |